Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 4 Apr 2012 00:12:22 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: MSCash2 CUDA

Lukas -

On Tue, Apr 03, 2012 at 11:52:40PM +0400, Solar Designer wrote:
> However, it failed to crack a test password.  I put this in a file:
> 
> $DCC2$10240#Joe#e09b38f84ab0be586b730baf61781e30

OK, apparently it should be:

$DCC2$Joe#e09b38f84ab0be586b730baf61781e30

but that is not getting cracked either, even though similar-looking
entries from cuda_mscash2_fmt.c tests[] are getting cracked.

Please make the necessary adjustments to make cuda_mscash2_fmt.c accept
the same kinds of input that mscash2_fmt_plug.c does, and please expand
the tests[].

It is OK to support only 10240 iterations (refuse to load entries that
specify a different number).

Thanks,

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.